Lorem ipsum dolor sit amet consectetur adipiscing elit quisque faucibus ex sapien vitae pellentesque sem.

Compliance with PCI DSS is crucial for any organization that stores, processes, and/or transmits credit card information. PCI DSS also applies to any service provider that can affect the security of another organization’s cardholder environment (CDE). Maintaining and managing compliance with PCI DSS can require heavy lifting within an organization, but the right partner can help ease the load.

While the number of requirements depends on the payment environment and number of transactions it is important to understand the different levels and how each card brand determines the compliance requirements.

History of the PCI DSS

The PCI-DSS was conceived in 2004 after five of the largest payment card issuers—Visa, MasterCard, American Express, Discover, and JCB formed a consortium called the Payment Card Industry Security Standards Council (PCI SSC) to tackle the ever-growing issue of card fraud. Instead of burdening merchants with five separate security standards, they decided to pool their resources and create a single, comprehensive standard that all five providers would accept.

As the cyber-security landscape has continued to evolve over the years, the PCI-DSS has had to change over time to address new threats and tactics to mitigate fraudsters. Since the initial release of the PCI-DSS 1.0 version in 2004, the standard has undergone several revisions, with the latest version 4.0, released in 2023.  

Since the most confusion comes from the 4 levels of merchants, this is the one I’m going to focus on. The number of controls depends on the number of transactions processed by the merchant per year.

PCI DSS Merchant Levels

There are several merchant levels, each with a slightly different list of requirements, and largely determined by the number of transactions processed each year.

Why define separate levels in the first place? The payment card industry (PCI) uses merchant levels to determine risk and ascertain the appropriate level of security for their businesses. Specifically, merchant levels determine the amount of assessment and security validation that is required for the merchant to pass the PCI DSS assessment.

At a very high level, the PCI DSS merchant levels are as follows:

While these tiers seem relatively straightforward at first glance, delving deeper, it may be difficult to discern exactly which one your organization falls into because the card issuers each maintain their own table of merchant levels. You’ll find that each one defines their levels a bit differently.

Even though the card issuers define their own levels, it’s important to note that Discover, Visa, and Mastercard all use the same general criteria to define theirs, with a few minor differences. Though JCB and American Express have their own versions, it is generally accepted that if you are a level for one provider, you will be considered the same for all, with a few minute exceptions. 

To view each card issuer’s table of merchant levels, use the links below:

Taking a closer look, the merchant levels are as follows:

Level 1

Level 2

Level 3

Level 4

Level 3 and Level 4 merchants may alternatively, at their own discretion, engage a PCI SSC-approved QSA for an onsite assessment instead of performing a self-assessment.

Visa updated their validation measurements as of January 31, 2017, for small merchants, the full document can be found here. But here are the sections I want to point out. All Level 4 merchants must use only Payment Card Industry (PCI) certified Qualified Integrator and Re-seller (QIR) professional for point-of-sale (POS) application and terminal instantiation and integration. Effective January 31st, 2017, acquirers must ensure Level 4 merchants annually validate PCI DSS compliance or participate in the Technology Innovation Program (TIP). Participation in TIP allows qualifying merchants to discontinue the annual PCI-DSS validation assessment.

Note: Single-use terminals without Internet connectivity (dial-up terminals) are considered low-risk and may be excluded from these requirements.

One other thing to note here is if you have been breached you will automatically be classified as a Level 1 merchant for PCI compliance purposes, regardless of transaction volume. Conducting a full ROC, even for a small organization, will likely be extremely daunting and expensive. So, there is an added incentive for you level 2 through 4 merchants to make sure that they truly are PCI compliant.

Fines and Consequences

  1. Monthly Penalties:

Non-compliance can result in penalties ranging from $5,000 to $100,000 per month by the Credit Card Companies (Visa, MasterCard, Discover, AMEX).  Penalties depend on the volume of clients and transactions; these volumes can help to determine what level of PCI-DSS compliance a company should be on.

  1. Data Breaches:

PCI DSS Compliance does not prevent data breaches; companies that meet PCI DSS requirements can suffer attacks and data loss.  If a company is compliant and suffers a data breach, it can still be responsible for paying penalties. However, the card brands may significantly lower or eliminate fines if the company in question has taken all the necessary steps to be PCI DSS compliant. 

Lawsuits against your company can be a common outcome. In 2007, TJX Companies (best known as the holder of Marshalls and T.J. Maxx) had to pay $40.9 million for a data breach that put an estimated 100 million bank cards at risk. In 2014, 1.1 million clients of Neiman Marcus were affected by another data breach.

Putting clients’ bank card information at risk can result in irreversible damage to a company’s reputation; this is in addition to any of the elevated costs that would be incurred by the organization. Once your security has been endangered, it will be very difficult for your clients to start trusting you again.

In addition to the loss of brand reputation, a merchant can expect their revenue to drop drastically due to the loss of clients followed by a security breach. In 2013, a large retail merchant was sentenced to $18.4 million for a data breach that affected more than 41 million customers. This led the merchant to a $ 440 million loss of revenue in the first quarter following the breach.

As a qualified security assessor company (QSAC), AccessIT not only conducts the official onsite PCI assessment to validate compliance, but we also work with our clients to develop long-term compliance strategies and streamline ongoing compliance maintenance. As an extension of your team, we go beyond compliance to help align security requirements, technology investments, and business goals to cost-effectively mitigate risk and improve business performance.

By: Chad Barr – Director of Governance, Risk & Compliance – CISSP | CCSP | CISA | CDPSE | QSA